Wormhole Bridge Exploit ($320M)
Nine days before the breach, Oracul identified testing of similar vulnerabilities on alternative bridge protocols. 36 hours before the attack, we noticed transactions mimicking verification procedures and rare function calls not typical for standard smart contract interactions.
These events helped us train Oracul to recognize subtle red flags in the blockchain environment. Our current detection models are shaped by such cases and continue to evolve with every anomaly processed.
Last updated